In fifteen pages this paper examines Internet crime in a consideration of system security concerns and the threats posed by computer hacking. Fifteen sources are cited in the bibliography.